Analysis
-
max time kernel
59s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2023 15:54
Static task
static1
Behavioral task
behavioral1
Sample
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe
Resource
win10v2004-20230220-en
General
-
Target
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe
-
Size
689KB
-
MD5
419f78993f29965cd3c3fcfc459937b1
-
SHA1
aa1244f33844b769ff336810ce57e7c322aa07ff
-
SHA256
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698
-
SHA512
34468c8953b1a0c07b9c8b01ccee8705328ff16a666c62dd01cce0f31e96e93cb0659e21761c4066613d194484a587574265c5ff8ba916ea706c6be9b0901175
-
SSDEEP
12288:TMrvy90nY6MGhbe/HHXA2HWDZa7cMF5sptCC/a1na23EEEFxJajsno4UdeMJDCON:MyAY6MQbATHWaF5sGC/a1nmEEFujs4ei
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9829.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9829.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4332-191-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-192-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-194-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-196-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-198-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-200-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-202-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-204-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-206-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-208-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-210-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-212-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-214-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-216-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-218-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-220-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-222-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/4332-224-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1148 un304040.exe 2180 pro9829.exe 4332 qu0530.exe 3732 si344543.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9829.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un304040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un304040.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4636 2180 WerFault.exe 84 3448 4332 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2180 pro9829.exe 2180 pro9829.exe 4332 qu0530.exe 4332 qu0530.exe 3732 si344543.exe 3732 si344543.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2180 pro9829.exe Token: SeDebugPrivilege 4332 qu0530.exe Token: SeDebugPrivilege 3732 si344543.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1148 1168 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 83 PID 1168 wrote to memory of 1148 1168 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 83 PID 1168 wrote to memory of 1148 1168 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 83 PID 1148 wrote to memory of 2180 1148 un304040.exe 84 PID 1148 wrote to memory of 2180 1148 un304040.exe 84 PID 1148 wrote to memory of 2180 1148 un304040.exe 84 PID 1148 wrote to memory of 4332 1148 un304040.exe 93 PID 1148 wrote to memory of 4332 1148 un304040.exe 93 PID 1148 wrote to memory of 4332 1148 un304040.exe 93 PID 1168 wrote to memory of 3732 1168 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 98 PID 1168 wrote to memory of 3732 1168 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 98 PID 1168 wrote to memory of 3732 1168 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe"C:\Users\Admin\AppData\Local\Temp\e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304040.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9829.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9829.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 10804⤵
- Program crash
PID:4636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0530.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 14844⤵
- Program crash
PID:3448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si344543.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si344543.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2180 -ip 21801⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4332 -ip 43321⤵PID:4448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5ee402b4602b030bd9b01220fdeab0bba
SHA19248c90dcfacbf2abf5909ea660a35c72b3bdaa1
SHA256edc8cd289fc5d350d6af6070ea742cf3e73052dfbce618c0fb2eec344e5eba5d
SHA5123d73faa0e2d2ad17ba88c0283100308d83fd830c44cd181446827e20e771afcd17c35dd7ce1f51351527f0a5808919f47cc3433b44cc7c3dd652725f022ec9e3
-
Filesize
169KB
MD5ee402b4602b030bd9b01220fdeab0bba
SHA19248c90dcfacbf2abf5909ea660a35c72b3bdaa1
SHA256edc8cd289fc5d350d6af6070ea742cf3e73052dfbce618c0fb2eec344e5eba5d
SHA5123d73faa0e2d2ad17ba88c0283100308d83fd830c44cd181446827e20e771afcd17c35dd7ce1f51351527f0a5808919f47cc3433b44cc7c3dd652725f022ec9e3
-
Filesize
536KB
MD5810bffb656c74128de6943257b81276b
SHA148c1b2b62d7103a800c9f46c92b7eb952d6787ba
SHA2565ed01b320ad843d2c870e4b21cd8ca3e9b4bb1bd95d3cd15987f67a966012ca4
SHA5124ed74a7b665811ee6c281ea7c8891a5fc143f4c05f39fdd25a64f9349a552d6379c9a6e9556e546551f809933557b05811a14fda4a94809fc7208272a08e28cb
-
Filesize
536KB
MD5810bffb656c74128de6943257b81276b
SHA148c1b2b62d7103a800c9f46c92b7eb952d6787ba
SHA2565ed01b320ad843d2c870e4b21cd8ca3e9b4bb1bd95d3cd15987f67a966012ca4
SHA5124ed74a7b665811ee6c281ea7c8891a5fc143f4c05f39fdd25a64f9349a552d6379c9a6e9556e546551f809933557b05811a14fda4a94809fc7208272a08e28cb
-
Filesize
314KB
MD5f637a5455b80c0146d7fc0f4fd624265
SHA11863bb9c6164223d5c14be7a50ecbd77382f317c
SHA25650f32f0c9f444dd20036da0fc5539007f622d89d9978f2bd0da494f2d62a4ad1
SHA512f9ed204371b284358cc89b7632782bdf0b9dff009e513e417061354c7ac7e92dec1bf146b43a689995633235ba35dd4c2c8b1a5a5c84df4304f3d19480d5c754
-
Filesize
314KB
MD5f637a5455b80c0146d7fc0f4fd624265
SHA11863bb9c6164223d5c14be7a50ecbd77382f317c
SHA25650f32f0c9f444dd20036da0fc5539007f622d89d9978f2bd0da494f2d62a4ad1
SHA512f9ed204371b284358cc89b7632782bdf0b9dff009e513e417061354c7ac7e92dec1bf146b43a689995633235ba35dd4c2c8b1a5a5c84df4304f3d19480d5c754
-
Filesize
372KB
MD5bb2dc070fc4f34f4b68b7be7bc9f1543
SHA14fbf083e36041eb1b41b53b07e53ef0dca373064
SHA2566b3e1fa16735d65ef89e659c39d48f37fc0d270e6997548ff58d1915561a6ae1
SHA512d7f587013f2e6b697cb51907f1cfa303dc13910b4479bc36d78984b091b9795e4e7c9b0f1a067ee7d6b5ed4b51b7098a38cd79cc369ced28662ed1f3af2b94d4
-
Filesize
372KB
MD5bb2dc070fc4f34f4b68b7be7bc9f1543
SHA14fbf083e36041eb1b41b53b07e53ef0dca373064
SHA2566b3e1fa16735d65ef89e659c39d48f37fc0d270e6997548ff58d1915561a6ae1
SHA512d7f587013f2e6b697cb51907f1cfa303dc13910b4479bc36d78984b091b9795e4e7c9b0f1a067ee7d6b5ed4b51b7098a38cd79cc369ced28662ed1f3af2b94d4